Category: 2. Security (220-1002)
2.6 User Authentication
2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002
User authentication allows you to let the system know that a valid account holder is logging into the system. Most validation requires a username and password. Single Sign On Single…
2.6 Shared Files and Folders
2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002
Administrative shares vs. local shares Administrative shares are created automatically by the operating system during install. Most administrative shares are hidden. Any share that has a $ after it is…
2.6 NTFS vs Share Permissions
2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002
Share permissions refer to users connecting to a share. Share permissions only apply to network sharing. NTFS permissions are assigned to the file system itself. Therefore, NTFS permissions affect both…
2.6 Windows User and Groups
2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002
Different levels of accounts are built into the Windows operating system. Administrator An Administrator is a super user, and can control everything on the operating system. Power user A Power…
2.5 Non Compliant Systems
2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002
Once a device is deployed out into a corporate environment, it’s a challenge to ensure that the device remains up to date and compliant with administrator specifications. Another challenge is…
2.5 Spoofing
2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002
Spoofing refers to when someone/something pretends to be something that they aren’t. Examples include fake web servers, fake DNS servers, fake email address, caller ID, etc. Spoofing is commonly used…